{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T13:40:35Z","timestamp":1725370835996},"reference-count":102,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3145372","type":"journal-article","created":{"date-parts":[[2022,1,21]],"date-time":"2022-01-21T21:34:19Z","timestamp":1642800859000},"page":"12345-12364","source":"Crossref","is-referenced-by-count":19,"title":["Digital Healthcare - Cyberattacks in Asian Organizations: An Analysis of Vulnerabilities, Risks, NIST Perspectives, and Recommendations"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-4598-355X","authenticated-orcid":false,"given":"Kamalanathan","family":"Kandasamy","sequence":"first","affiliation":[]},{"given":"Sethuraman","family":"Srinivas","sequence":"additional","affiliation":[]},{"given":"Krishnashree","family":"Achuthan","sequence":"additional","affiliation":[]},{"given":"Venkat P.","family":"Rangan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","year":"2017","journal-title":"2017 Healthcare IT News"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1599272.1599278"},{"key":"ref33","first-page":"1","article-title":"Security breaches in healthcare data: An application of the actor-network theory","volume":"16","author":"stachel","year":"2015","journal-title":"Issues in Inform Syst"},{"key":"ref32","year":"2022","journal-title":"Hackers Attack Indian Healthcare"},{"key":"ref31","year":"2022","journal-title":"Zdnet News Article"},{"key":"ref30","year":"2022","journal-title":"Cyber Threats 2020 A Year in Retrospect"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1093\/intqhc\/mzaa117"},{"key":"ref36","year":"2022","journal-title":"2017 Healthcare IT News"},{"key":"ref35","year":"2022","journal-title":"2020 News Asia Report"},{"key":"ref34","article-title":"Phishing attack on UC Davis health breaches data on 15,000 patients","author":"davis","year":"2017"},{"key":"ref28","year":"2022","journal-title":"Straitstimes News Article"},{"key":"ref27","year":"2017","journal-title":"Digital Information Security in Healthcare Act (DISHA) of India"},{"key":"ref29","year":"2022","journal-title":"GovInsider News Article"},{"key":"ref20","year":"2016","journal-title":"Global State of Information Security Survey"},{"key":"ref22","article-title":"Health care cybersecurity challenges and solutions under the climate of COVID-19: Scoping review","volume":"23","author":"he","year":"2021","journal-title":"J Med Internet Res"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-70692-0"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.maturitas.2018.04.008"},{"key":"ref23","year":"2020","journal-title":"Asia Pacific Healthcare Cybersecurity Market"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.18203\/2394-6040.ijcmph20195864"},{"key":"ref26","year":"2018","journal-title":"Asia Pacific Data Security Report"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3205040"},{"key":"ref25","year":"2019","journal-title":"Government Insider Asia Report"},{"key":"ref50","year":"0","journal-title":"2021 TrendMicro Report"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1080\/2331205X.2018.1513349"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987475"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/s12530-020-09335-4"},{"key":"ref57","year":"2022","journal-title":"Fireeye Report on APT"},{"key":"ref56","year":"2022","journal-title":"2020 Computer Weekly News Report"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.3390\/app10113874"},{"key":"ref54","year":"2022","journal-title":"2017 Center for Internet Security Advisory"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.3390\/s19051114"},{"key":"ref52","year":"0","journal-title":"2019 Parima Report"},{"key":"ref40","article-title":"Cybersecurity threats in healthcare organizations: Exposing vulnerabilities in the healthcare information infrastructure","volume":"24","author":"hoffman","year":"2020","journal-title":"Inf Secur Emerg Voices"},{"key":"ref4","year":"2018","journal-title":"Data Breach Investigations Report"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99713-1"},{"key":"ref6","year":"2020","journal-title":"Data breach report"},{"key":"ref5","year":"2019","journal-title":"Healthcare data breach report"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/su12177002"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3453176"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/healthcare8020133"},{"key":"ref9","first-page":"38","article-title":"Interpreting the impact of perceived privacy and security concerns in patients' use of online health information systems","volume":"8","author":"ambrose","year":"2015","journal-title":"J Inf Priv Secur"},{"key":"ref46","year":"2022","journal-title":"2020 ICLG News on Cyberattacks"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1136\/bmjhci-2019-100031"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-5826-5_3"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2016.10.001"},{"key":"ref42","year":"0","journal-title":"Computer Weekly Report"},{"key":"ref41","year":"0","journal-title":"Orangeworm Need-to-Know Information for Healthcare IT"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxh169"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.2196\/16775"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.5121\/csit.2017.70305"},{"key":"ref72","year":"2022","journal-title":"Adopting the NIST Cybersecurity Framework in Healthcare"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-020-00111-0"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.3390\/sym13050742"},{"key":"ref76","article-title":"The cybersecurity framework: Implementation guidance for federal agencies","author":"barrett","year":"8170"},{"key":"ref77","year":"2022","journal-title":"2017 HIMSS (Healthcare Information and Management Systems Society) Cybersecurity Survey Report"},{"key":"ref74","article-title":"Exploring the implications of the 2014 NIST cybersecurity framework on shaping reasonable national and international cybersecurity practices","author":"shackleford","year":"2015","journal-title":"Texas International Law Journal"},{"key":"ref75","article-title":"An introductory resource guide for implementing the HIPAA security rules","author":"scholl","year":"2008"},{"key":"ref78","article-title":"Technical evaluation, testing, and validation of the usability of electronic health records","author":"lowry","year":"7804"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2007.55"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134067"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/S1070-3241(02)28025-6"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/1558607.1558646"},{"key":"ref63","first-page":"1","article-title":"Mission dependency modeling for cyber situational awareness","author":"heinbockel","year":"2016","journal-title":"Proc NATO IST Symp Cyber Defence Situation Awareness"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1201\/1086.1065898X\/45390.14.3.20050701\/89149.6"},{"key":"ref65","year":"2022","journal-title":"National Vulnerability Database"},{"key":"ref66","first-page":"6","article-title":"A comprehensive security assessment toolkit for healthcare systems","volume":"4","author":"acharya","year":"2015","journal-title":"Colonial Academic Alliance Undergraduate Research Journal"},{"key":"ref67","year":"2022","journal-title":"2021 Netwrix Cloud Data Security Report"},{"key":"ref68","year":"2022","journal-title":"Netwrix Cloud Security Report"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2870068"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.1867"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.7861\/futurehosp.15.015"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-012-1275-x"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocz005"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2010.06.013"},{"key":"ref92","year":"2013"},{"key":"ref91","year":"2016"},{"key":"ref90","article-title":"Evaluating medical IoT (MIoT) device security using NISTIR-8228 expectations","author":"dover","year":"2021"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.3390\/info10070242"},{"key":"ref98","first-page":"391","article-title":"Validity and reliability issues in educational research","volume":"2","author":"oluwatayo","year":"2012","journal-title":"Journal of Educational and Social Research"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.01324"},{"key":"ref96","year":"2022","journal-title":"Computer Security Incident Handling Guide"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1177\/0898264313510033"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2019.8730765"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1108\/CGIJ-05-2015-0013"},{"key":"ref12","article-title":"Description of SA weak password's harm and solution in the SQL server system","volume":"29","author":"cao","year":"2012","journal-title":"J Journal of Xingtai Polytechnic College"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.20961\/aseandynamics.v1i1.46794","article-title":"Potential and threat analysis towards cybersecurity in South East Asia","volume":"1","author":"salsabila","year":"2020","journal-title":"J ASEAN Dyn Beyond"},{"key":"ref14","year":"2018","journal-title":"HIMSS Cybersecurity Survey"},{"key":"ref15","year":"2022","journal-title":"Cybersecurity Framework-NIST"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3290688.3290721"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1166\/jmihi.2020.3138"},{"key":"ref17","year":"2018","journal-title":"Healthcare data breach report"},{"key":"ref81","first-page":"1540","article-title":"Software penetration testing","volume":"3","author":"mcgraw","year":"2005","journal-title":"IEEE Secur Privacy"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph18010334"},{"key":"ref84","year":"2022","journal-title":"NIST SP800-30 NIST Risk Management Guide for Information Systems"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.wneu.2017.06.104"},{"key":"ref83","year":"2022","journal-title":"NIST SP800-39 Managing Information Security Risk"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1002\/nem.2060"},{"key":"ref89","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1111\/rmir.12169","article-title":"Cyber risk management: History and future research directions","volume":"24","author":"mcshane","year":"2021","journal-title":"Risk Management & Insurance Review"},{"key":"ref85","year":"2022","journal-title":"OWASP top 10 vulnerabiltities"},{"key":"ref86","article-title":"OWASP secure medical device deployment standard","author":"frenz","year":"2017"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.09.004"},{"key":"ref88","first-page":"105","article-title":"Information security risk assessment: Data analysis","author":"martin","year":"2012","journal-title":"Information Security Risk Assessment Toolkit"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09690161.pdf?arnumber=9690161","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T03:22:20Z","timestamp":1674530540000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9690161\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":102,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3145372","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}